0

Operating Systems - 7

Description: Test your knowledge on operating systems like UNIX,LINUX,XENIX
Number of Questions: 25
Created by:
Tags: UNIX TYPES OF UNIX OS BSD UNIX UNIX COMMANDS SHELL PROGRAMMING Basic Fundamentals Hardware and Software Computers Time and Distance Number Systems Error Identification Sentence Correction/Sentence Improvement
Attempted 0/25 Correct 0 Score 0

_____ matrix is the representation of all access rights of all subjects to all objects in a computer system.

  1. Acceptance

  2. Rejection

  3. Protection

  4. Access


Correct Option: D

____ program may be written to steal user passwords.

  1. Trojan horse

  2. Trojan lion

  3. Trojan tiger

  4. None of these


Correct Option: A

MAC stands for _____.

  1. Manual Access Control

  2. More Access Control

  3. Mandatory Access Control

  4. None of these


Correct Option: C

____ are used to authenticate users.

  1. Passwords

  2. Group names

  3. Both 1 and 2

  4. None of these


Correct Option: A

Computer worms are _____.

  1. data

  2. information

  3. programs

  4. none of these


Correct Option: C

The art of breaking ciphers is called _____.

  1. encryption

  2. cryptanalysis

  3. cryptsynthesis

  4. none of these


Correct Option: B

____ are the secret points of entry without access authorization.

  1. Main doors

  2. Trap doors

  3. Both 1 and 2

  4. None of these


Correct Option: B

DAC stands for _____.

  1. Discretionary Access Control

  2. Difficult Access Control

  3. Dual Access Control

  4. None of these


Correct Option: A

A cryptographic system that uses different keys for encryption and decryption is said to be _____.

  1. symmetric

  2. asymmetric

  3. symantic

  4. none of these


Correct Option: B

A cryptographic system that uses the same key for both encryption and decryption is said to be _____.

  1. symmetric

  2. asymmetric

  3. symantic

  4. none of these


Correct Option: A

In cryptography, the plain text is encrypted to get _____ text.

  1. plain

  2. cipher

  3. both 1 and 2

  4. none of these


Correct Option: B

In cryptography, original unenciphered text is called _____ text.

  1. plain

  2. cipher

  3. both 1 and 2

  4. none of these


Correct Option: A

Take and grant are two special _____.

  1. rights

  2. programmes

  3. modes

  4. none of these


Correct Option: A

____ is a graph-based model that describes a restricted class of protection systems.

  1. Take-grant

  2. Issue-grant

  3. Give-grant

  4. None of these


Correct Option: A

_____ is a token that gives the subject possessing it permission to access a specific object.

  1. Acceptance

  2. Rejection

  3. Protection

  4. Capability


Correct Option: D

_____ list is an enumeration of the specific access rights of all entities that are authorised to a given object.

  1. Acceptance

  2. Rejection

  3. Protection

  4. Access


Correct Option: D

_____ rings are a generalisation of the concept of a supervisor state.

  1. Acceptance

  2. Rejection

  3. Protection

  4. Access


Correct Option: C

The encryption method uses _____ as a parameter.

  1. key

  2. lock

  3. unlock

  4. none of these


Correct Option: A

Which of the following are the common access control mechanisms?

  1. Hierarchies

  2. Lists

  3. Both 1 and 2

  4. None of these


Correct Option: C

Protection rings are introduced in _____.

  1. MULTICS

  2. DOS

  3. UNIX

  4. LINUX


Correct Option: A

False _____ ratio is the percentage of legitimate users who are denied access due to the failure of the authentication mechanism.

  1. acceptance

  2. rejection

  3. neutral

  4. none of these


Correct Option: B

_____ domain is the collection of access rights.

  1. Acceptance

  2. Rejection

  3. Protection

  4. None of these


Correct Option: C

False _____ ratio is the percentage of illegitimate users erroneously admitted.

  1. acceptance

  2. rejection

  3. neutral

  4. none of these


Correct Option: A

Computer _____ is a piece of code that infect other programs.

  1. disease

  2. viruse

  3. both 1 and 2

  4. none of these


Correct Option: B

Computer _____ can invade computers.

  1. mouses

  2. worms

  3. both 1 and 2

  4. none of these


Correct Option: B
- Hide questions